Bellridge-KRMC Enterprise Edition

KRMC Enterprise Edition


Remote Management for Enterprise

Quick Overview:

 

The Kanguru Remote Management Console™ (KRMC)™ Enterprise Edition 5.0 is a powerful application that enables security administrators to remotely manage and control select Kanguru secure USB portable devices from anywhere in the world.  Remotely wipe or delete lost or stolen devices, limit invalid login attempts, create reports, restrict IP addresses, manage security updates, reset passwords, and much more.

 

Advanced Features:

 

Centrally Manage Kanguru Defender 2000, Defender Elite, Defender Basic+, Defender HDD, Defender SSD & Kanguru Virtual Defender Devices.


  • •  Simple and Easy to Use 
  • •   Common Criteria EAL 2+
  • •   Remotely Disable / Delete Lost or Stolen Drives
  • •  Remote Enable
  • •  Manage Password Strength and Length
  • •  Limit Invalid Login Attempts
  • •  Locate Devices via IP Addresses  and Hosts
  • •  Set Master Password
  • •  Generate Graphical Reports
  • •  Optional USB Device Control 
  • •  and much more

Technical Specifications:

Model Number KRMC
Server System Requirements
  • • 1.8Ghz Dual-Core CPU (or better) – x86 32-bit and 64-bit supported
  • • Windows Server 2003 or 2008
  • • Administrative rights on the Server
  • • IIS version 6.0 / 7.0 / 7.5
  • • Microsoft .NET 2.0 Framework
  • • Minimum of 100MB of available storage on the local hard drive for application files.
  • • Additional local storage required by Microsoft SQL database depending on the number of clients and the activity on the network. The storage space is relative to the number of client machines and their activity
  • • Available HTTPS Port - 443 by Default
  • • 2 GB RAM
Admin System Requirements

Operating system:

    • • Windows XP Home or Professional (Service Pack 2 is recommended)
    • • Windows Vista (All Versions)
    • • Windows 2000 (Service Pack 4)
  • • Administrative rights on the Server
  • • Microsoft .NET 2.0 Framework
  • • Fully functional internet / network connections
  • • Available HTTPS Port - 443 by Default
  • • 32 MB of available memory on the hard drive
  • • Minimum of 1GB RAM
  • • Supported browsers: Internet Explorer 9.0 or later, Firefox 3 or later, Safari 4, Chrome
  • • Flash player for web browser.
Shipping Weight 1 lb



Product Description


Kanguru Remote Management Console (KRMC™) is a enterprise grade server application that allows IT administrators and Security Officers to remotely manage select Kanguru secure USB devices from anywhere in the world. If a device is lost or stolen, an administrator can automatically delete its data as soon as the device is connected to a computer. With the Enterprise Edition, KRMC is fully managed on the customer’s server and is ideal for enterprise businesses and government agencies because it is entirely self-managed giving the IT administrator full control.




Common Criteria EAL 2+


Kanguru Remote Management Console (KRMC)™ Enterprise Edition 5.0
 meets the Common Criteria EAL 2+ standards. Common Criteria is an accreditation process adopted by over 24 different certifying nations, and is a much wider review process of the overall product design and functionality than FIPS. It covers the product from its inception to final product and overall use.


KRMC is designed to work specifically with the following Kanguru secure portable devices:


  • •  Defender 2000
  • •  Defender Elite
  • •  Defender Basic+
  • •  Defender SSD
  • •  Defender HDD
  • •  Virtual Defender



When a supported Kanguru USB secure device is connected to a computer with a network or internet connection, an administrator will be able to view detailed information and activity reports about the device. KRMC allows the administrator to monitor where the device is connected and the hostname of the computer. If the administrator has chosen to delete a device's data, the audit function will verify when the remote deletion occurs. An administrator can export audit logs, allowing compatibility with applications such as Excel and databases. User and administrator activities can be logged for various regulatory compliance.


Additional security is available when KRMC is combined with Kanguru USB Device Control, adding endpoint security to control which devices are allowed to access your workstations or network. When used together, they create a turn-key solution with unmatched security at a fraction of the cost of point solutions.




KRMC Enterprise requires a minimum purchase of:


  • •  25 KRMC Device Licenses Per Year
  • •  25 KRMC Device Maintenance Contract
  • •  Kanguru Local Administrator Configuration Tool

If you have a smaller organization or single drive, see our cloud hosted solution: KRMC Cloud




Remote Disable/Delete – KRMC allows administrators to remotely disable or delete lost, stolen or compromised devices to protect sensitive information and prevent data breaches.


Remote Enable – Gives security officers the ability to remotely enable a disabled device.


Password Management – KRMC allows administrators to manage a variety of password functions including: password length, strength, expiration, invalid login attempts, and master password. Passwords can also be changed or updated remotely to help users recover forgotten passwords and also meet new security policies.


Remote Provisioning – Remotely manage security policy changes from a single location. Control password complexity, password expiration, online and offline access, and more.


Offline Restrictions – Control whether devices can be used offline. Prevent unauthorized use in external networks.


IP and Domain Control – Manage which IP and/or domains are allowable for devices to access via whitelist and blacklist methodology.


Auditing and Reporting – KRMC enforces a full audit trail with detailed graphical reporting and the ability to export both customizable audit logs and graphs for external analysis to ensure proper compliance.


Groups – Manage and control groups of devices.


Administration – Granular level access to actions for individual administrators.


App Launcher – Auto-launch applications on Defender devices upon successful login.


Active Directory Support – initial provisioning and deployment with Microsoft Active Directory support.


Messaging/E-mail Alerts – Remotely send messages to devices in the field with informative messages or announcements for workers to see when they have their Kanguru device connected. Also, setup e-mail alerts to notify administrators when certain events take place. (i.e.- device deleted, password changed, etc.)


Secure Tunnel - All communication occurs over secure SSL or TLS channel.




Key Features


  • •  Remote Delete (Deletes all data on the target drive)
  • •  Action Scheduling  (present or future times)
  • •  Auditing at administrator and super administrator level
  • •  Locate via IP address and Hostname (IP Address / network 
  •  •  location)
  • •  Remote policy modifications:

    • -  Password Strength and Length (i.e. 10 characters: 2 upper etc)
    • -  Limit Invalid Login Attempts (i.e. 3 retries before drive is wiped)
    • -  Change user password
    • -  Change master password

  • •  User groups (Admin & Super Admin)
  • •  Device & License Import 
  • •  Advanced Users & Groups Management
  • •  IP & Domain Control
  • •  Active Directory Support
  • •  Support for TLS & SSL communication
  • •  Export audit log data to XLS
  • •  Advanced filtering 
  • •  Device Groups
  • •  Real Time Graphical Reports
  • •  Uses ANSI X9.31 Random Number Generator



Export Compliance Terms


You understand and acknowledge Kanguru products are subject to regulation by agencies of the U.S. government, including the U.S.Department of Commerce, which prohibit export or diversion of certain products and technology to certain countries. Any and all of Your obligations with respect to Kanguru products shall be subject in all respects to such United States laws and regulations as shall from time to time govern the license and delivery of technology and products abroad by persons subject to the jurisdiction of the United States, including the Export Administration Act of 1979, as amended, any successor legislation, and the Export Administration Regulations ("EAR") issued by the Department of Commerce, International Trade Administration, and Bureau of Export Administration. You warrant that you will comply in all respects with the export and re-export restrictions applicable to the Products and will otherwise comply with the EAR or other United States laws and regulations in effect from time to time.

Recipient Warranty. You warrant and agree that You are not: (i) located in, under the control of, or a national or resident of Taliban controlled Afghanistan, Cuba, Iraq, Libya, North Korea, Iran, Syria, or Sudan, or (ii) on the U.S Treasury Department list of Specially Designated Nationals or the U.S. Commerce Departments Table of Deny Orders.

Which Secure Drive is Best for You?
Designed and Developed By Media3